NATIONAL SECURITY COUNCIL. WASHINGTON,O.C ra F!JR Case No o'l-ol. November 5~ 1975

Size: px
Start display at page:

Download "NATIONAL SECURITY COUNCIL. WASHINGTON,O.C. 20506 ra F!JR Case No o'l-ol. November 5~ 1975"

Transcription

1 . 11/cl~,/ tv//..:(' NATIONAL SECURITY COUNCIL WASHINGTON,O.C ra F!JR Case No o'l-ol GONFIDE!~TIAL Oocc..Ement No -.._;.-_..:../::;..~~---- November 5~ 1975 Dear MitclJ.: Attached are the NSC Staff comments onthe Senate Select Committee 1 s draft 11 C overt Action.in Chile, The fundamental point to be made our perspective is that a public statement copfirming not only the 11 fact of'' but specifics of past covert actions will have a terribly damaging impc;.ct on: our position of leadership in the international community; our position vis-a-vis the Soviet Union and other adversaries; and our ability to preserve intelligence relationships with many countries. These matters may be considered in E:xecutive session,and, if need be, legislation proposed based.upon these hearings. As a practical matter, we recognize the difficulty of publishing. a report of substance without citing examples which to draw conclusions.the alternative to a report of substance could be a statement of general findings, conclusions and recommendations, along with a classified annex, suitably sanitized, to support these findings. I think the attached comments support the necessity for avoiding public disclosure of the type c;.nd scope of our activitie s in Chile and the concomitant danger of placing at hostage the sue.cess of future covert activities. In short, we support a strong objection, on principie, to any unclassified publication of this material. Sincerely; 4/ ~~- McFarlane Lt. Colone l; U.S.M.C. Military Assistant to the A s sis t a nt Withheld under statutory authority of the to the President for National Central Intelligence Agency Act of 1949 (50 Secur,Ity Affairs U.S.C., section 403g) / _ Central Intelligen c e Agency ~ATTACHMENTS 1!E..CLAS_$_lFI~J>-JJNJlER AUTHORITY OF THE INTERAGENCY SECURITY CLASSIFICATION APPEALS PANEL. E.O , SECTION 5.3(b)(3) ISCAP No \ D- OO"I., document \ l Photo C-opy Gerald R. Ford Library

2 Comments on Senate Select Committee Report on Chile We have reviewed the Church Committee Staff Report on Covert Action in Chile and concur most strongly in the CIA position that this material should not be published and should not be discussed in public session. In general, the report is markedly one-sided. It refers to "massive" involvement, b~t as compared to what? It makes it appear that only the United States was involved in tliis activity, and make.s no attempt to cor relate our activity with that of Cuba and the Soviet Union on the other side. It ajso infers. the documentation that has been provided the Committee that there was direct U.S. involvement in the coup and the death of General Rene Schneider, which was not the case. In addition, we recognize the legitimacy of a debate on whether or not the United States should cnnduct covert activity at all or whether we should have done so in Chile. However, such a debate cannot take place in public without, in effect, prejudging the issue. Such public debate would provide our potential adversaries with sufficient material (as "'!ell as frighten off any potential collaborators) to destroy.for all practical purposes any U.S. capability to conduct covert operations, even if it s.hould be decided such operations were in the U.S. interest.. Also, how can they equate this study with the legal requirement of the Director of Centrq.l Intelligence to protect intelligence sources and methods? The Committee study clearly says it is describing CIA methods --it uses that label. It also exposes individuals and groups.. 0I'l IV-18 it describes in some detail and if one misses the correct identification, well, more details are.. offe.red on page I 1-- and while the study notes that 11 Uncon.fl.rmed charges of CIA involvement were made, 11 the study proposes.to correct that by confirming that CIA was indeed involved. Why is.it necessary to name names? The story could be told in generalities-- a large newspaper, a p-lajor politicalparty, a political splinter group, etc. But throughout the paper names are named. In fact, sometimes specific individual agents may be Photo C-opy Gerald R. Ford l.:.ibraty. I

3 2 I E.O , section ~,3(b)(1) 1. Specific individuals who took risks to collaborate with us in clandestine endeavors which our policy makers deemed were in our national interests are to be subject to public exposure and worse. It is not cloak-and-daggerish to suggest that some lives could be in jeopardy. And what about the impact on our efforts elsewhere in the world?. Can we expect to attract the collaborators we need to conduct clandestine operations if they see that their names and roles may be publicized by the Congress? And what about other places where leaders are looking for "paper tigers'' to bash around and use this material to claim that a newspaper in their country {or a rival politician-.:.australia today, for example- -or military group, etc. is ''obviously 11 being supported by CIA because here is an official document of the Congress which describes this as one of CIA's methods. _, On page V -2, the study philosophically notes the fact ''That the United States was involved has been taken for granted in Latin America for many years. 11 Again, it proposes to. remove all doubts. by offering confirming evidence, naming names, telling who got the rnoney and how much! I E.O , section 3.3(b}(l} On page V -4 it throws some tar but notes 'on page V -6 that CIA faces a difficult situation.in talking about relations with multinational corporations for fear it "may reveal sensitive sources and methods." L ' Exposure could. ruin careers, _destroy the economic we ll being, or worse, of many individuals. And the fact remains, that in spite of char~ that CIA Photo C-opy Gerald R. Ford tibrary

4 3 The DCI says, this material remains classified~ To give it pubhc exposure could endanger the lives of individuals who cooperated with us, affect our foreign relations not only with Chile but with other nations, and would be a serious and harmful blow to future, clandestine and covert action operations of our government. We have marked in red the various identifications which we believe should be protected. Stating this information in generalities would not detract the conchisions of the study or its purpose of analyzing the system. There would still be sufficient details to support the conclusions. If we are going to fight against release of classified information which would damage our.foreign policy and national security interests, this is the time. e Photo Copy Gerald R. Ford Library

5 '..... :. Comments on Senate Select Committee Report on Chile ;. We have reviewed th e Church Corpmittee StaffReport on Covert Action in Chile and concur most strongly in the CIA position that this material should not be published and should not be discussed in public session :.. \' ' :.: In general, the report is markedly one-sided. It refers to "massive'' involvement, but as compared to what? It makes it appear that only the United States was involved in this activity, and makes no attempt to correlate our activity with that of Cuba and the Soviet Union on the other side. It also infers the documentation that has been provided the Committee that there was direct U.S. involvement in the coup and the death of Generai Rene Schneider, which was not the case. In addition, we recognize the legitimacy of a debate on whether or not the United States should conduct covert activity-at all or whether we should have done so in Chile. However, such a debate cannot take place in public without, in effect, prejudging the issue. Such public debate would provide our potential adversaries with sufficient material (as well as frighten o f 'any potential collaborators) to destroy for all practl.cal purposes any U.S. capability to conduct covert operations, even if it should be decided such operations were in the u.s. interest. 0 -~ - Also, how can they equate this study with 'the legal requirement of the Director of Central Intelligence to protect intelligence sources and methods? The Committee study clearly says it is describing CIA methods -- it uses that label. It also exposes individua.ls and groups. On IV-18 it desc~ibes in some detail and if one misses the correct identification, well, more details are. offered on page I 1-- arid while the study notes that.rr Unconfirmed charges of CIA involvement were made, 11 the study proposes to correct that by confirming that CIA was indeed involved. Why is it necessary to name names?. The story could be told in generalities -- a large newspaper,.a Jnajor political party, a political splinter group, etc. But throughout the paper names are named. In fact, soznetimes spec.ific individual agents may be I :. :... e. Photo Copy... -:;. G~rald ~.. Ford Ubrary

6 . ~.., '..... z. ' '.. 1 F).~. f~s26,. ~ection3.~(b)(l).i.identi(ied-- e. g., IV, 7~. -"a Rad~ ~~l jburriali~tl, Iwho joined with others who are identifh;;d on 2 June to or anize the Legion of Liberty;.., :... --~ : -': ~~.. :.;,_.., :~> ~ ~\ : :_. ~...~ - :-.~ ~~~ :'.,..: ~-- ~ :~:~ -:;or~~:.:~~~.::::~ _ :. - _.';,:... : -~~;;.;.-.-:: - --~ <- :.- -. Specific individuals ' whotookrisks '.tocoijaborat'e~ with 'us'' in clandestine ~ndeavo.rs vthi~h '~U.r '"p~lic\r:.~la~e~s,d,ee.med 'w~~ e in ;..' our national interests are to be,:st1bjed to public exposure and ~ worse. It is.not cloak~aild-dagg~;ish to S.D.gg~s(that ~ om.e lives... co~ld be in j~~gardy _i ~S-~:<.. :..... ''''-~:s ;;~,t~ - z:a:x~~:~,;~h=,i:'apc~-\~:!'c~i[a-j };!t~s;:-~: t:~c t~n c':ja::i! ~iilt~.::,;,<(';:...,... clandestine op~rations ifthey ~ee that their : :na:f:ne"i'a~r;les m:a:y.. ~,~,., : ~: ; - be." publicized by the Cqngress? Anq what ab()ut other places,:vher;_e - -~.C"".. I~aders are looking.for 11 paper tiger sri to bash around and use. this '-<.~< f:: ~.'>:~ material to claim that a new spaper ih their country (or a rival. politician--australia today, for example--or military group, etc. is "obviously" being supported by CIA because here is an official document of the Congress which describe!? this as one of CIA's method$..: :: On page V -2, the study, philosophitally notes. the fact 11 That the United States was involved has been taken for granted in Latin America for.many years. 11 Again, itproposes to remove all doubts by offering confirming evid,ence, n;;trhing names, telling.who got the money and how much!. je;p.13526,se<;tion 3.3(b)(1) I. On page V -4 it throws some tar but notes on page V -6 that CIA faces a difficult situation in talking about relations with multinational corporations for fear it 11 may reveal sensiti,ve sources and methods." Exposure could ruin careers, destr.oy the economic well being, or worse, of many individuals. And the fact remains, that in spite of charges that CIA....\..-,... _.,.... ' :-.. plfdfo oo py...: '.'.: :.- Gerald.'f,fFord Library,: ~....

7 #... '..".....: '.. -~ - : # 3. '.. > :. ~ :,.... '. -~ IL ~-E_.o_._l-35_2_6,-se-c-tio...,...n-3--,.3...,...(b.,...)(-1),..,..._...,..--~l... '...., ' The DCI says this material remains classified. To give it public exposure could' endanger the lives of individuals who cooperated with us, affect our foreign relations not only with Chile.but with other nations, and wouldbe _ a serious ~ nd harmful blow to future clandestine and covert action operations of our government. ' -;.. We have marked in red the various identifications -...vhl.~h we believe should be protected. Stating this information i!). generalities.would not detract the conclusions of the study or its purpose of analyzing the system. The re would still be sufficient details to support the conclusions ;.... If we are going to fight against release of classified inform ation.--which would damage our.foreign p~licy and national security i..ote rests, this is the time.,.. -: '... :.. _, '. :,...: :-.... :~- -- ::.....:....,. ~ ::...:::.'.:=:,...,,.: ;.,: ;,.. - ~.:..'.,. _; ':'.' :'.. : ~..' -...._,,.,,,,... '". ~.. ', ~... :.'... :.:...:.... -:-- -.: ~~~ '..... I'...: :.. :... :.. ;... : ~ ::- ;"... : :. i -. ;..-:...'.,. e ":...,.., _Photo C-opy <;;erald R. Ford Library

Case 1:14-cv-01031-GBL-IDD Document 29-1 Filed 12/05/14 Page 1 of 16 PageID# 174 EXHIBIT A

Case 1:14-cv-01031-GBL-IDD Document 29-1 Filed 12/05/14 Page 1 of 16 PageID# 174 EXHIBIT A Case 1:14-cv-01031-GBL-IDD Document 29-1 Filed 12/05/14 Page 1 of 16 PageID# 174 EXHIBIT A Case 1:14-cv-01031-GBL-IDD Document 29-1 Filed 12/05/14 Page 2 of 16 PageID# 175 IN THE UNITED STATES DISTRICT

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,

More information

Access to United States Government Records at the U.S. National Archives and Records Administration

Access to United States Government Records at the U.S. National Archives and Records Administration Access to United States Government Records at the U.S. National Archives and Records Administration DAVID J. MENGEL Chief, Special Access and FOIA Staff National Archives and Records Administration In

More information

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

This page left blank.

This page left blank. This page left blank. Introduction 2 Reminders 2 SECTION 1 Originally Classified Documents 3 Portion Marking 5 Overall Classification Marking 6 Classification Authority Block Classified By line 7 Reason

More information

FACT SHEET NLF MR Case No o1 t>.:l

FACT SHEET NLF MR Case No o1 t>.:l FACT SHEET NLF MR Case No o1 t>.:l Doc~ment No -...;...:;.._;...::;;;;;... On Nay 5, 1976, the J?epartment of Jus tice submitted the firs t of a series of requests for the declassification of a number

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

United States Department of Agriculture Office of Inspector General

United States Department of Agriculture Office of Inspector General United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture s Office of Homeland Security and Emergency Coordination - Classification Management Audit Report 61701-0001-32

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

Public Law 96-226 96th Congress An Act

Public Law 96-226 96th Congress An Act PUBLIC LAW 96-226 APR. 3, 1980 94 STAT. 311 Public Law 96-226 96th Congress An Act To improve budget management and expenditure control by revising certain provisions relating to the Comptroller General

More information

Information and records management. Purpose. Scope. Policy

Information and records management. Purpose. Scope. Policy Information and records management NZQA Quality Management System Policy Purpose The purpose of this policy is to establish a framework for the management of corporate information and records within NZQA.

More information

How safe is the American homeland?

How safe is the American homeland? The Oxford Council on Good Governance OCGG Security Section Advice Program US Foreign, Security, and Defence Policy Governance Area US Security Policy You may not be interested in war, but war is interested

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

DIVISION N CYBERSECURITY ACT OF 2015

DIVISION N CYBERSECURITY ACT OF 2015 H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table

More information

THE ATTORNEYS GENERAL OF NEW YORK, IOWA, MAINE, MARYLAND, OREGON AND WASHINGTON. March 16, 2015

THE ATTORNEYS GENERAL OF NEW YORK, IOWA, MAINE, MARYLAND, OREGON AND WASHINGTON. March 16, 2015 THE ATTORNEYS GENERAL OF NEW YORK, IOWA, MAINE, MARYLAND, OREGON AND WASHINGTON Honorable James M. Inhofe, Chairman Senate Committee on Environment and Public Works 410 Dirksen Senate Office Building Washington,

More information

WikiLeaks Document Release

WikiLeaks Document Release WikiLeaks Document Release February 2, 2009 Congressional Research Service Report 95-753 Presidential Emergency Powers: The So-Called War Powers Act of 1933 David M. Ackerman, American Law Division Updated

More information

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION 2:10-cr-20535-DML-MAR Doc # 335 Filed 05/31/13 Pg 1 of 8 Pg ID 6782 UNITED STATES OF AMERICA, UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION v. Plaintiff, BOBBY W. FERGUSON,

More information

[Discussion Draft] [DISCUSSION DRAFT] H. R. ll

[Discussion Draft] [DISCUSSION DRAFT] H. R. ll F:\M14\CHAFFE\CHAFFE_05.XML [Discussion Draft] 114TH CONGRESS 1ST SESSION [DISCUSSION DRAFT] H. R. ll To amend title 1, United States Code, to regulate the use of cell-site simulators, and for other purposes.

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy By: Dan Arnaudo Copyright 2013, ASA Institute for Risk & Innovation Keywords: Congress, CISPA, Critical Infrastructure,

More information

Grades Middle & high school

Grades Middle & high school Roles & Powers of the President Overview This lesson introduces the office of President by discussing the qualifications necessary for serving in the office, as well as the roles and powers of the President

More information

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws.

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws. Criminal Law Month Content Skills August Introduction to law Define the term jurisprudence. What is law? Explain several reasons for having laws. Discuss the relationship between laws and values. Give

More information

SUBJECT ACCESS REQUEST

SUBJECT ACCESS REQUEST DATA PROTECTION ACT 1998 SUBJECT ACCESS REQUEST Procedure Manual 1 Invest NI Subject Access Request Procedure Manual 1. Introduction 1.1 What is a Subject Access Request? 1.2 Routine Requests 1.3 What

More information

Derbyshire Constabulary STREET BAIL GUIDANCE POLICY REFERENCE 05/005. This guidance is suitable for Public Disclosure

Derbyshire Constabulary STREET BAIL GUIDANCE POLICY REFERENCE 05/005. This guidance is suitable for Public Disclosure Derbyshire Constabulary STREET BAIL GUIDANCE POLICY REFERENCE 05/005 This guidance is suitable for Public Disclosure Owner of Doc: Head of Department, Corporate Services Date Approved: December 2005 Review

More information

DWIGHT D. EISENHOWER LIBRARY ABILENE, KANSAS. U.S. NATIONAL SECURITY COUNCIL PRESIDENTIAL RECORDS, Intelligence Files: 1953-1961

DWIGHT D. EISENHOWER LIBRARY ABILENE, KANSAS. U.S. NATIONAL SECURITY COUNCIL PRESIDENTIAL RECORDS, Intelligence Files: 1953-1961 DWIGHT D. EISENHOWER LIBRARY ABILENE, KANSAS U.S. NATIONAL SECURITY COUNCIL PRESIDENTIAL RECORDS, Intelligence Files: 1953-1961 Accession: 04-12; 11-09 Processed by DJH; MMK This collection consists of

More information

Parliamentary monitoring mechanism on intelligence agencies in selected places

Parliamentary monitoring mechanism on intelligence agencies in selected places RP06/07-08 30 May 2008 Prepared by Thomas WONG Research and Library Services Division Legislative Council Secretariat 5th Floor, Citibank Tower, 3 Garden Road, Central, Hong Kong Telephone : (852) 2869

More information

Request for Records,...D-is_p_o_s-it-io_n_A_u_t_h_o-ri_ty... ~ Le_a_v_e-B-Ia_n_k-(N_A_RA--Us_e_O_nl-y)--1

Request for Records,...D-is_p_o_s-it-io_n_A_u_t_h_o-ri_ty... ~ Le_a_v_e-B-Ia_n_k-(N_A_RA--Us_e_O_nl-y)--1 ~' Request for Records,...D-is_p_o_s-it-io_n_A_u_t_h_o-ri_ty... ~ Le_a_v_e-B-Ia_n_k-(N_A_RA--Us_e_O_nl-y)--1 {See Instructions on reverse) Job Number " 1 To: National Archives and Records Administration

More information

PUBLIC LAW 105 272 OCT. 20, 1998 INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 1999

PUBLIC LAW 105 272 OCT. 20, 1998 INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 1999 INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 1999 112 STAT. 2396 PUBLIC LAW 105 272 OCT. 20, 1998 Oct. 20, 1998 [H.R. 3694] Intelligence Authorization Act for Fiscal Year 1999. Public Law 105 272 105th

More information

Public Law 106-95 106th Congress An Act

Public Law 106-95 106th Congress An Act 113 STAT. 1312 PUBLIC LAW 106-95 NOV. 12, 1999 Public Law 106-95 106th Congress An Act N 19 iqqq "^^ amend the Immigration and Nationality Act with respect to the requirements ; for the admission of nonimmigrant

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Public Law 103-62. 103rd Congress -- 1st Session [S. 20] 103 P.L. 62; 107 Stat. 285 1993 Enacted S. 20; 103 Enacted S. 20 DATE: AUG.

Public Law 103-62. 103rd Congress -- 1st Session [S. 20] 103 P.L. 62; 107 Stat. 285 1993 Enacted S. 20; 103 Enacted S. 20 DATE: AUG. Public Law 103-62 103rd Congress -- 1st Session [S. 20] 103 P.L. 62; 107 Stat. 285 1993 Enacted S. 20; 103 Enacted S. 20 DATE: AUG. 3, 1993 SYNOPSIS: An Act To provide for the establishment of strategic

More information

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence

BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence BGS Managing Director Michael Allen s Book, Blinking Red, is Reviewed By The Center for the Study of Intelligence Blinking Red Book Review March 2014 Reviewed by Roger Z. George The far-reaching intelligence

More information

http://www.washingtontimes.com/news/2015/sep/21/danielgallington-the-chinese-hack-of-opm/

http://www.washingtontimes.com/news/2015/sep/21/danielgallington-the-chinese-hack-of-opm/ Daniel J. Gallington Daniel J. Gallington is Adjunct Professor of Law at the University of Illinois College of Law in Champaign-Urbana, Illinois, where he teaches National Security Law. Mr. Gallington

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

INTELLIGENCE SUPPORT TO U.S. BUSINESS. Steven M. Shaker Director of Business Intelligence Global Associates, Ltd.

INTELLIGENCE SUPPORT TO U.S. BUSINESS. Steven M. Shaker Director of Business Intelligence Global Associates, Ltd. INTELLIGENCE SUPPORT TO U.S. BUSINESS BY Steven M. Shaker Director of Business Intelligence Global Associates, Ltd. George Kardulias Deputy Director of Business Intelligence Global Associates, Ltd. Presented

More information

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing

More information

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. BAG Discussion Draft S.L.C. TH CONGRESS ST SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE

More information

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

Report on the Telephone Records Program. Conducted under Section 215. of the USA PATRIOT Act and on the

Report on the Telephone Records Program. Conducted under Section 215. of the USA PATRIOT Act and on the PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court

More information

CRS Report for Congress Received through the CRS Web

CRS Report for Congress Received through the CRS Web CRS Report for Congress Received through the CRS Web 97-526 GOV Updated June 24, 1998 Puerto Rico: A Chronology of Political Status History Garrine P. Laney Analyst in American National Government Government

More information

parent ROADMAP SUPPORTING YOUR CHILD IN GRADE FIVE ENGLISH LANGUAGE ARTS

parent ROADMAP SUPPORTING YOUR CHILD IN GRADE FIVE ENGLISH LANGUAGE ARTS TM parent ROADMAP SUPPORTING YOUR CHILD IN GRADE FIVE ENGLISH LANGUAGE ARTS 5 America s schools are working to provide higher quality instruction than ever before. The way we taught students in the past

More information

S. 274 and H.R. 985. YES YES Language Identical. Sec. 1 (b) Sec. 2 (a) NO YES

S. 274 and H.R. 985. YES YES Language Identical. Sec. 1 (b) Sec. 2 (a) NO YES 1. Overturns existing hostile case law from Federal Circuit Court of Appeals and restores definition of any disclosure. Government Accountability Project National Office 1612 K Street, N.W. Suite 1100

More information

The issue of Secret Ballot: Chapter I. Sovereignty versus Transparency by IWMC

The issue of Secret Ballot: Chapter I. Sovereignty versus Transparency by IWMC The issue of Secret Ballot: Chapter I Sovereignty versus Transparency by IWMC Table of Contents I. Secret ballots at CITES: Sovereignty versus Transparency II. Historical background III. Proposals for

More information

SOCIAL STUDIES TEST for e-lessons day 2

SOCIAL STUDIES TEST for e-lessons day 2 SOCIAL STUDIES TEST for e-lessons day 2 Name Directions: Use your own piece of paper as your answer document. Do not print off the test. You will need to only turn in your answer document. 29. The Cold

More information

Rules of the Engagement: Compliance, Legalities and Ethics in Audiology Today. 2011 AAA Convention Chicago, IL

Rules of the Engagement: Compliance, Legalities and Ethics in Audiology Today. 2011 AAA Convention Chicago, IL Rules of the Engagement: Compliance, Legalities and Ethics in Audiology Today 2011 AAA Convention Chicago, IL 1. Ignorance is NOT a defense 2. Rules, regulations, guidance and laws do not have to be interpreted

More information

VIA E-MAIL. February 1, 2012

VIA E-MAIL. February 1, 2012 VIA E-MAIL February 1, 2012 Representative Sam Johnson, Chair U.S. House Committee on Ways & Means Subcommittee on Social Security 1211 Longworth House Office Building Washington, DC 20515 Dear Chairman

More information

Sample Letter or Email to Request an Appointment

Sample Letter or Email to Request an Appointment Sample Letter or Email to Request an Appointment The Honorable (Member of Congress Name) United States Senate (or United States House of Representatives) District office address and city Fax number or

More information

... X AMNESTY INTERNATIONAL USA, CENTER : FOR CONSTITUTIONAL RIGHTS, INC., and : WASHINGTON SQUARE LEGAL SERVICES, : INC.,

... X AMNESTY INTERNATIONAL USA, CENTER : FOR CONSTITUTIONAL RIGHTS, INC., and : WASHINGTON SQUARE LEGAL SERVICES, : INC., UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK... X AMNESTY INTERNATIONAL USA, CENTER : FOR CONSTITUTIONAL RIGHTS, INC., and : WASHINGTON SQUARE LEGAL SERVICES, : INC., v. Plaintiffs, CENTRAL

More information

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the

More information

Bas~c Accoun~~nll NZELE DAVID NZOMO. "'lwalnn or NAIWoml\'~ZJI'-""M" fl. 9. Ikx lrhj7. 1i.JQ. University of Nairobi Press. iijjmiiimllii ---~_---1 \

Bas~c Accoun~~nll NZELE DAVID NZOMO. 'lwalnn or NAIWoml\'~ZJI'-M fl. 9. Ikx lrhj7. 1i.JQ. University of Nairobi Press. iijjmiiimllii ---~_---1 \ Bas~c Accoun~~nll Principles and Procedures NZELE DAVID NZOMO. "'lwalnn or NAIWoml\'~ZJI'-""M" fl. 9. Ikx lrhj7 1i.JQ University of Nairobi Press iijjmiiimllii 04965091 ---~_---1 \ Epigraph List of Abbreviations

More information

5 FAM 480 CLASSIFYING AND DECLASSIFYING NATIONAL SECURITY INFORMATION EXECUTIVE ORDER 13526

5 FAM 480 CLASSIFYING AND DECLASSIFYING NATIONAL SECURITY INFORMATION EXECUTIVE ORDER 13526 5 FAM 480 CLASSIFYING AND DECLASSIFYING NATIONAL SECURITY INFORMATION EXECUTIVE ORDER 13526 5 FAM 481 GENERAL (CT:IM-162; 05-29-2015) (Office of Origin: A/GIS/IPS) 5 FAM 481.1 POLICY AND PURPOSE a. This

More information

Credit Risk Management System Checklist and Manual

Credit Risk Management System Checklist and Manual Credit Risk Management System Checklist and Manual Credit risk is the risk that a financial institution will incur losses because the financial position of a borrower has deteriorated to the point that

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

September 22, 1987. Taxation--Kansas Retailers' Sales Tax--Exempt Sales. Taxation--Income Tax--Taxable Income

September 22, 1987. Taxation--Kansas Retailers' Sales Tax--Exempt Sales. Taxation--Income Tax--Taxable Income ROBERT T. STEPHAN ATTORNEY GENERAL September 22, 1987 ATTORNEY GENERAL OPINION NO. 87-141 The Honorable Ben E. Vidricksen State Senator, Twenty-Fourth District 713 N. 11th Street Salina, Kansas 67401 Re:

More information

No. 44/2006 PART I GENERAL PROVISIONS AND AUTHORITY ENFORCEMENT

No. 44/2006 PART I GENERAL PROVISIONS AND AUTHORITY ENFORCEMENT Ministry of Social Affairs and Health Unofficial translation No. 44/2006 Act on Occupational Safety and Health Enforcement and Cooperation on Occupational Safety and Health at Workplaces (as amended by

More information

One View Of Customer Data & Marketing Data

One View Of Customer Data & Marketing Data One View Of Customer Data & Marketing Data Ian Kenealy, Head of Customer Data & Analytics, RSA spoke to the CX Network and shared his thoughts on all things customer, data and analytics! Can you briefly

More information

S. ll IN THE SENATE OF THE UNITED STATES A BILL

S. ll IN THE SENATE OF THE UNITED STATES A BILL TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information

More information

S. 754 AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

S. 754 AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled, TH CONGRESS 1ST SESSION S. AN ACT To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. 1 Be it enacted by the Senate

More information

TITLE III INFORMATION SECURITY

TITLE III INFORMATION SECURITY H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable

More information

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy

FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013. My name is Richard Allan, and I am the Director of Public Policy FACEBOOK STATEMENT RICHARD ALLAN NOVEMBER 11, 2013 [I. INTRODUCTION] My name is Richard Allan, and I am the Director of Public Policy for Facebook in Europe, the Middle East and Africa. I have been with

More information

LEGISLATIVE OVERSIGHT OF INTELLIGENCE ACTIVITIES: THE U.S. EXPERIENCE REPORT THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE

LEGISLATIVE OVERSIGHT OF INTELLIGENCE ACTIVITIES: THE U.S. EXPERIENCE REPORT THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE "EÛT COMMTTTEE PRINT «LEGISLATIVE OVERSIGHT OF INTELLIGENCE ACTIVITIES: THE U.S. EXPERIENCE REPORT PREPARED BY THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ONE HUNDRED THIRD CONGRESS SECOND

More information

JOHN DAVIDSON WOODWARD, JR.

JOHN DAVIDSON WOODWARD, JR. JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: jdwjr@bu.edu

More information

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. BAG0 Discussion Draft S.L.C. TH CONGRESS D SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE

More information

MICHIGAN OCCUPATIONAL SAFETY AND HEALTH ACT Act 154 of 1974. The People of the State of Michigan enact:

MICHIGAN OCCUPATIONAL SAFETY AND HEALTH ACT Act 154 of 1974. The People of the State of Michigan enact: MICHIGAN OCCUPATIONAL SAFETY AND HEALTH ACT Act 154 of 1974 AN ACT to prescribe and regulate working conditions; to prescribe the duties of employers and employees as to places and conditions of employment;

More information

PROCEDURES AND COSTS FOR PATENTS

PROCEDURES AND COSTS FOR PATENTS Attorneys At Law Patents, Trademarks & Copyrights Columbus, Ohio 7632 Slate Ridge Blvd. 614/575-2100 Reynoldsburg, Ohio 43068-8159 www.ohiopatent.com PROCEDURES AND COSTS FOR PATENTS PLEASE NOTE: This

More information

The HR Technology Risk Factor

The HR Technology Risk Factor The following article was commissioned by ADP to aid industry advisors in assisting clients with the selection of service providers for outsourcing HR technology and benefits administration functions.

More information

G. Recalls. http://www.fda.gov/safety/recalls/industryguidance/ucm129259.htm.

G. Recalls. http://www.fda.gov/safety/recalls/industryguidance/ucm129259.htm. G. Recalls 1. Background When an FDA-regulated product is defective, potentially harmful, or mislabeled, recalling that product removing it from the market or correcting the problem is often the most effective

More information

1. Which of the following is NOT an argument in support of imperialism or expansionism?

1. Which of the following is NOT an argument in support of imperialism or expansionism? U.S I Quarterly Assessment Practice Test Circle the best answer to each question. 1. Which of the following is NOT an argument in support of imperialism or expansionism? A. The United States should become

More information

Guidelines for Foreign Companies that wish to. operate Employee Stock Compensation Plans. in Trinidad and Tobago

Guidelines for Foreign Companies that wish to. operate Employee Stock Compensation Plans. in Trinidad and Tobago TRINIDAD AND TOBAGO SECURITIES AND EXCHANGE COMMISSION Guidelines for Foreign Companies that wish to operate Employee Stock Compensation Plans in Trinidad and Tobago May 14 th 2009 Table of Contents Background...

More information

THE FREEDOM OF INFORMATION ACT A User s Guide

THE FREEDOM OF INFORMATION ACT A User s Guide THE FREEDOM OF INFORMATION ACT A User s Guide By The Freedom of Information Clearinghouse A Project of Ralph Nader (Revised 11/05) The Freedom of Information Act ( FOIA ) was enacted by Congress in 1966

More information

Emergency Management: Myth Versus Reality

Emergency Management: Myth Versus Reality Emergency Management: Myth Versus Reality Page 1 of 2 Emergency Management Team The town s emergency management team has two different factions: one acts on the reality of the situation and the people

More information

DIVISION N CYBERSECURITY ACT OF 2015

DIVISION N CYBERSECURITY ACT OF 2015 U:\0REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR0-AMNT.xml DIVISION N CYBERSECURITY ACT OF 0 SEC.. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 0.

More information

Background of Canadian Criminal Justice Association

Background of Canadian Criminal Justice Association BRIEF TO THE SENATE COMMITTEE ON SOCIAL AFFAIRS, SCIENCE AND TECHNOLOGY SENATE OF CANADA 41 st Parliament, 2nd Session AN ACT TO AMEND THE CRIMINAL CODE AND THE NATIONAL DEFENCE ACT (NOT CRIMINALLY RESPONSIBLE

More information

Computer Fraud & Abuse Act

Computer Fraud & Abuse Act Computer Fraud & Abuse Act Computer Fraud and Abuse Act (18 USC 1030) COMPUTER FRAUD AND ABUSE STATUTE ' 1030. Fraud and related activity in connection with computers (a) Whoever (1) knowingly accesses

More information

Freedom of Information Act 2000 (FOIA) Decision notice

Freedom of Information Act 2000 (FOIA) Decision notice Freedom of Information Act 2000 (FOIA) Decision notice Date: 28 September 2015 Public Authority: Address: Wigan Metropolitan Borough Council Town Hall Library Street Wigan WN1 1YN Decision (including any

More information

Problems With Real Estate Agents Exit this survey >>

Problems With Real Estate Agents Exit this survey >> Problems With Real Estate Agents Exit this survey >> 1. Home Inspection Survey Introduction As you know, over the past 2-4 yrs in both the Missouri and Kansas area we've had special interest groups including

More information

28 CFR Ch. I (7 1 11 Edition)

28 CFR Ch. I (7 1 11 Edition) 0.75 the interpretation of Executive Order 10501 of November 5, 1953, as amended, and of regulations issued thereunder in accordance with section 11 of that order; and the interpretation of Executive Order

More information

FEB 0 S 2012. The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515

FEB 0 S 2012. The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515 The Honorable John Boehner Speaker United States House ofrepresentatives Washington, D.C. 20515 FEB 0 S 2012. The Honorable Harry Reid Majority Leader United States Senate Washington, D.C. 20510 The Honorable

More information

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan:

John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505. November 4, 2015. Mr. Brennan: John O. Brennan Central Intelligence Agency Office of Public Affairs Washington, D.C. 20505 November 4, 2015 Mr. Brennan: On March 31, 2015 several organizations called on the Central Intelligence Agency

More information

Volume 03 - Information Management. Part 1 - Publications, Mail, and Information Disclosure (3.01-3.25)

Volume 03 - Information Management. Part 1 - Publications, Mail, and Information Disclosure (3.01-3.25) NRC MD Assistance: Catalog Page I of 8 NRC Management Directives Web Assistance for MD Preparation, Editing, and Review I HomeI Catalog of Directives Catalog Volume 01 - Management Directives Volume 02

More information

Financial Management Regulation Volume 11A, Chapter 15 *November 2012

Financial Management Regulation Volume 11A, Chapter 15 *November 2012 VOLUME 11A, CHAPTER 15: TRAINING OF SPECIAL OPERATIONS FORCES WITH FRIENDLY FOREIGN FORCES SUMMARY OF MAJOR CHANGES All changes are denoted by blue font. Substantive revisions are denoted by an * symbol

More information

WEEKLY SAFETY MEETING All Euramax Subsidiaries ACCIDENT REPORTING. Safety Meeting Contents. Meeting Notice. Leaders Guide.

WEEKLY SAFETY MEETING All Euramax Subsidiaries ACCIDENT REPORTING. Safety Meeting Contents. Meeting Notice. Leaders Guide. Safety Meeting Contents Meeting Notice Leaders Guide Employee Handout Employee Quiz Meeting Sign-In Sheet Employee Puzzle PRIOR TO THE WEEKLY MEETING: - Post the meeting notice by the timeclock - Read

More information

I would also be grateful to receive the name of the contact we should liaise with.

I would also be grateful to receive the name of the contact we should liaise with. Your ref: Our ref: FOI 12/0880 Department of Energy & Climate Change Head of HR Policy 55 Whitehall London SW1A 2EY London SW1A 2HD E: @decc.gsi.gov.uk www.decc.gov.uk 6 July 2012 RE: FOI 12/0880 Further

More information

Information Flows and Covert Channels

Information Flows and Covert Channels Information Flows and Covert Channels Attila Özgit METU, Dept. of Computer Engineering ozgit@metu.edu.tr Based on: Mike McNett s presentation slides CENG-599 Data Security and Protection Objectives Understand

More information

berg COMPUTERS Corporate Responsibility

berg COMPUTERS Corporate Responsibility berg COMPUTERS Corporate Responsibility Tel: +40-256-225223 Fax: +40-256-225772 E-mail: bc@berg-computers.com www.berg-computers.com, ww.bcmanager.ro Contents berg COMPUTERS Corporate Responsibility...1

More information

HARRINGTON FAMILY LAWYERS

HARRINGTON FAMILY LAWYERS HARRINGTON FAMILY LAWYERS GIVING EVIDENCE One witness is better than ten hearsays. Proverbs 1. WHEN EVIDENCE NEEDS TO BE GIVEN When people go to court about a dispute, the court can act only on their evidence

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

Using Survey Research to Evaluate Communications Campaigns

Using Survey Research to Evaluate Communications Campaigns Using Survey Research to Evaluate Communications Campaigns Prepared for the Communications Consortium Media Center Belden Russonello & Stewart November 2004 Introduction When should a non-profit communications

More information

POSITIVE EDUCATION REQUIREMENTS FOR FEDERAL LIBRARIANS

POSITIVE EDUCATION REQUIREMENTS FOR FEDERAL LIBRARIANS POSITIVE EDUCATION REQUIREMENTS FOR FEDERAL LIBRARIANS A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the Federal Library and Information Committee

More information